{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:47Z","timestamp":1762005107093,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T00:00:00Z","timestamp":1551657600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61802243","61572246"],"award-info":[{"award-number":["61802243","61572246"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The fundamental research Funds for Gentral universities","award":["GK201803005"],"award-info":[{"award-number":["GK201803005"]}]},{"name":"The fundamental research Funds for central universities","award":["2017CSY001"],"award-info":[{"award-number":["2017CSY001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11280-019-00671-3","type":"journal-article","created":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T04:17:57Z","timestamp":1551673077000},"page":"959-989","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control"],"prefix":"10.1007","volume":"23","author":[{"given":"Qiang","family":"Cao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2395-6000","authenticated-orcid":false,"given":"Yanping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhenqiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yinbin","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,4]]},"reference":[{"issue":"4","key":"671_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing clearing the clouds away from the true potential and obstacles posed by this computing capability. Commun. ACM 53(4), 50\u201358 (2010). \nhttps:\/\/doi.org\/10.1145\/1721654.1721672","journal-title":"Commun. ACM"},{"key":"671_CR2","doi-asserted-by":"publisher","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp 44\u201355. IEEE Computer Society (2000), \nhttps:\/\/doi.org\/10.1109\/SECPRI.2000.848445","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"671_CR3","doi-asserted-by":"publisher","unstructured":"Kim, K.S., Kim, M., et al.: Forward secure dynamic searchable symmetric encryption with efficient updates. In: ACM Sigsac Conference, pp 1449\u20131463. ACM (2017), \nhttps:\/\/doi.org\/10.1145\/3133956.3133970\n\n\n\nhttps:\/\/doi.org\/10.1145\/3133956.3133970","DOI":"10.1145\/3133956.3133970 10.1145\/3133956.3133970"},{"key":"671_CR4","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-319-56617-7_4","volume-title":"Lecture Notes in Computer Science","author":"Seny Kamara","year":"2017","unstructured":"Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Proceedings International Conference on the Theory and Applications of Cryptographic Techniques, pp 94\u2013124 (2017), \nhttps:\/\/doi.org\/10.1007\/978-3-319-56617-7_4"},{"key":"671_CR5","doi-asserted-by":"publisher","unstructured":"Li, H.W., Yang, Y., Dai, Y.S., et al.: Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput. \nhttps:\/\/doi.org\/10.1109\/TCC.2017.2769645\n\n\n\nhttps:\/\/doi.org\/10.1109\/TCC.2017.2769645\n\n (2017)","DOI":"10.1109\/TCC.2017.2769645 10.1109\/TCC.2017.2769645"},{"issue":"16","key":"671_CR6","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume":"3027","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Crescenzo, G.D., et al.: Public key encryption with keyword search. Eurocrypt 3027(16), 506\u2013522 (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24676-3_30","journal-title":"Eurocrypt"},{"key":"671_CR7","doi-asserted-by":"publisher","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference, pp 535\u201354. Springer, Berlin (2007), \nhttps:\/\/doi.org\/10.1007\/978-3-540-70936-7_29","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"671_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11071-018-4413-9","volume":"3","author":"M Noroozi","year":"2018","unstructured":"Noroozi, M., Eslami, Z., Pakniat, N.: Comments on a chaos-based public key encryption with keyword search scheme. Nonlinear Dyn. 3, 1\u20136 (2018). \nhttps:\/\/doi.org\/10.1007\/s11071-018-4413-9","journal-title":"Nonlinear Dyn."},{"issue":"16","key":"671_CR9","first-page":"1","volume":"29","author":"SC Yu","year":"2010","unstructured":"Yu, S.C., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine grained data access control in cloud computing. IEEE INFCOM 29(16), 1\u20139 (2010)","journal-title":"IEEE INFCOM"},{"issue":"4","key":"671_CR10","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"WH Sun","year":"2016","unstructured":"Sun, W.H., Yu, S.C., Lou, W.J., et al.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-forced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187\u20131198 (2016). \nhttps:\/\/doi.org\/10.1109\/TPDS.2014.2355202","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"671_CR11","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","volume":"11","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Ma, M.: Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans. Inf. Forensics Secur. 11(4), 746\u2013759 (2017). \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2509912","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"671_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSC.2017.2757467","volume":"60","author":"YB Miao","year":"2017","unstructured":"Miao, Y.B., Ma, J.F., Liu, X.M., et al.: Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans. Serv. Comput. 60(12), 1\u201314 (2017). \nhttps:\/\/doi.org\/10.1109\/TSC.2017.2757467","journal-title":"IEEE Trans. Serv. Comput."},{"key":"671_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-70278-0_3","volume-title":"Financial Cryptography and Data Security","author":"James Alderman","year":"2017","unstructured":"Alderman, J., Martin, K., Renwick, S. L.: Multi-level access in searchable symmetric Encryption. In: Proceedings of International Conference on Financial Cryptography and Data Security, vol. 3494, pp 35\u201352. Springer, Cham (2017), \nhttps:\/\/doi.org\/10.1007\/978-3-319-70278-0_3"},{"key":"671_CR14","doi-asserted-by":"publisher","unstructured":"Fan, Y.D., Wu, X.P., Wang, J.S.: Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage. In: Proceedings of IEEE Second International Conference on Data Science in Cyberspace, pp 205\u2013212 (2017), \nhttps:\/\/doi.org\/10.1109\/DSC.2017.10","DOI":"10.1109\/DSC.2017.10"},{"key":"671_CR15","doi-asserted-by":"publisher","unstructured":"Li, M., Yu, S., Cao, N., et al.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference Distributed Computing Systems, pp 383\u2013392 (2011), \nhttps:\/\/doi.org\/10.1109\/ICDCS.2011.55","DOI":"10.1109\/ICDCS.2011.55"},{"key":"671_CR16","doi-asserted-by":"publisher","unstructured":"Sun, W.H., Liu, X.F., Lou, W.J., et al.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: IEEE Computer Communications, pp 2110\u20132118 (2015), \nhttps:\/\/doi.org\/10.1109\/INFOCOM.2015.721859","DOI":"10.1109\/INFOCOM.2015.721859"},{"key":"671_CR17","doi-asserted-by":"publisher","unstructured":"Liu, Q., Nie, X.H., Liu, X.H., et al.: Verifiable ranked search over dynamic encrypted data in cloud computing. In: Proceedings of IEEE\/ACM International Symposium on Quality of Service, pp 1\u20136 (2017), \nhttps:\/\/doi.org\/10.1109\/IWQoS.2017.7969156","DOI":"10.1109\/IWQoS.2017.7969156"},{"key":"671_CR18","doi-asserted-by":"publisher","unstructured":"Fuhr, T., Paillier, P.: Decryptable searchable encryption. In: Proceedings. Provable Security, 1st International Conference, DBLP, vol. 4784, pp 228\u2013236 (2007), \nhttps:\/\/doi.org\/10.1007\/978-3-540-75670-5_17","DOI":"10.1007\/978-3-540-75670-5_17"},{"issue":"9","key":"671_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.4156\/jdcta.vol4.issue9 https:\/\/doi.org\/10.4156\/jdcta.vol4.issue9","volume":"4","author":"LM Fang","year":"2010","unstructured":"Fang, L.M., Wang, J.D., Ge, C.P., et al.: Decryptable public key encryption with keyword search schemes. Int. J. Digit. Content Technol. Appl. 4(9), 141\u2013150 (2010). \nhttps:\/\/doi.org\/10.4156\/jdcta.vol4.issue9","journal-title":"Int. J. Digit. Content Technol. Appl."},{"key":"671_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-016-6244-5","volume":"4","author":"ZR Shen","year":"2018","unstructured":"Shen, Z.R., Shu, J.W., Xue, W.: Preferred search over encrypted data. Front. Comput. Sci. 4, 1\u201315 (2018). \nhttps:\/\/doi.org\/10.1007\/s11704-016-6244-5","journal-title":"Front. Comput. Sci."},{"key":"671_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ins.2018.02.017","volume":"442\u2013443","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Liu, X.M., Deng, R.H.: Expressive query over outsourced encrypted data. Inf. Sci. 442\u2013443, 33\u201353 (2018). \nhttps:\/\/doi.org\/10.1016\/j.ins.2018.02.017","journal-title":"Inf. Sci."},{"key":"671_CR22","doi-asserted-by":"crossref","unstructured":"Saito, T., Nakanishi, T.: Designated-senders public-key searchable encryption secure against keyword guessing attacks. In: International Symposium on Computing & Networking IEEE Computer Society, pp 496\u2013502 (2017)","DOI":"10.1109\/CANDAR.2017.22"},{"key":"671_CR23","doi-asserted-by":"publisher","unstructured":"Xie, R., Xui, C.X., Li, F.G., et al.: Ciphertext retrieval against insider attacks for cloud storage. In: IEEE International Conference on Computer and Communications, pp 202\u2013206 (2017), \nhttps:\/\/doi.org\/10.1109\/CompComm.2016.7924693","DOI":"10.1109\/CompComm.2016.7924693"},{"issue":"038106","key":"671_CR24","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11432-017-9124-0","volume":"3","author":"LX Sun","year":"2018","unstructured":"Sun, L.X., Xu, C.X., Zhang, M.W., et al.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China (Inf. Sci.) 3(038106), 61 (2018). \nhttps:\/\/doi.org\/10.1007\/s11432-017-9124-0","journal-title":"Sci. China (Inf. Sci.)"},{"key":"671_CR25","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification. In: Proceedings in Network and Distributed System Security Symposium (2012)"},{"issue":"5","key":"671_CR26","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L.H., Wang, M., et al.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265(5), 176\u2013188 (2014). \nhttps:\/\/doi.org\/10.1016\/j.ins.2013.11.021","journal-title":"Inf. Sci."},{"key":"671_CR27","doi-asserted-by":"publisher","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: Proceedings of IEEE Symposium on Security Privacy IEEE Computer Society, pp 639\u2013654 (2015), \nhttps:\/\/doi.org\/10.1109\/SP.2014.47","DOI":"10.1109\/SP.2014.47"},{"key":"671_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403\u2013404","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Li, H.B.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403\u2013404, 1\u201314 (2017). \nhttps:\/\/doi.org\/10.1016\/j.ins.2017.03.038","journal-title":"Inf. Sci."},{"key":"671_CR29","doi-asserted-by":"publisher","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of International Conference on Theory and Applications of Cryptographic Techniques, vol. 3494, pp 457\u2013473. Springer, Berlin (2005), \nhttps:\/\/doi.org\/10.1007\/1142663927","DOI":"10.1007\/1142663927"},{"key":"671_CR30","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security","author":"Takashi Nishide","year":"2008","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Proceedings of International Conference on Applied Cryptography and Network Security, vol. 5037, pp 111\u2013123. Springer, Berlin (2008), \nhttps:\/\/doi.org\/10.1007\/978-3-540-68914-0_7"},{"key":"671_CR31","doi-asserted-by":"publisher","unstructured":"Yousefipoor, V., Ameri, M.H., Mohajeri, J., et al.: A secure attribute based keyword search scheme against keyword guessing attack. In: 2016 8th International Symposium on Telecommunications (IST), pp 124\u2013128 (2016), \nhttps:\/\/doi.org\/10.1109\/ISTEL.2016.7881795","DOI":"10.1109\/ISTEL.2016.7881795"},{"key":"671_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63962-8_232-1","volume-title":"Keyword attacks and privacy preserving in public-key-based searchable encryption. Encyclopedia of Big Data Technologies","author":"P Jiang","year":"2018","unstructured":"Jiang, P., Guo, F.C., Susilo, W., et al.: Keyword attacks and privacy preserving in public-key-based searchable encryption. Encyclopedia of Big Data Technologies. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-63962-8_232-1"},{"key":"671_CR33","doi-asserted-by":"publisher","unstructured":"Zheng, Q.J., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM, pp 522\u2013530 (2014), \nhttps:\/\/doi.org\/10.1109\/INFOCOM.2014.6847976","DOI":"10.1109\/INFOCOM.2014.6847976"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00671-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-019-00671-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00671-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T04:25:48Z","timestamp":1583727948000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-019-00671-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,4]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["671"],"URL":"https:\/\/doi.org\/10.1007\/s11280-019-00671-3","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2019,3,4]]},"assertion":[{"value":"4 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}